Tech Dictionary: Discovering Cyber Attacks

Post blog virus - Phishing - LF Impianti

Every day and every moment, a company or a user is fighting a silent battle, to avoid being hacked by hackers and viruses.
It is important to raise awareness about IT Security, because so many of our data can be found through the computer and the network, risking constant exposure.

Today we will discover the different types of attacks and the relative modes of action, to also understand how to defend ourselves and who to rely on to avoid them.

But first of all it is fair to ask …

… What is a cyber attack?

What are the most common cyber attacks?

Beware of the click: Malware & Phishing

Post blog virus - Malware - LF Impianti

Malware, a term you may have heard of at least once, defines malicious software, such as spyware, ransomware, viruses, and worms.

What Causes Malware? It breaches a network by exploiting a possible vulnerability, typically when a user clicks a malicious link or opens an attachment received by email that installs malicious software.

We anticipate that, LF Facilities, as well as providing you with IT security which we will discuss later, through the choice of using our service of corporate helpdesk will offer your employees the opportunity to entrust the task of verification of suspicious emails to our trained technicians, so as to continue with the normal workflow without risk and disruption.

But now the question arises: once inside the system, what can malware do?

  • Block access to core network components (ransomware)
  • Install malware or other malicious software
  • Obtain information by stealth by transmitting data from the hard drive (spyware)
  • Interfere with some components and render the system inoperable.
Post blog virus - Phishing - LF Impianti

Phishing, similar to malware, consists of sending fraudulent communications that appear to come from a reliable source, usually an email. Its goal is to steal sensitive data such as credit cards and login information, or to install malware on the victim’s computer. Phishing is an increasingly common cyber threat and it is important to know how to recognize and avoid it.

Post blog virus - MitM - LF Impianti

Watch out for Wi-Fi:

Man in the Middle attacks

Man in the middle (MitM) attacks, also known as eavesdropping attacks , occur when hackers enter into a transaction between two parties . By doing so, once they have stopped traffic, they can filter and steal data .
MitM attacks go through unsecured public Wi-Fi networks , where hackers can sneak between a visitor’s device and the network.

In this way, unknowingly, the visitor passes all the information to the hacker, and once the malware has violated a device, the latter can install software to process all the victim’s data.

Post blog virus - ddOs - LF Impianti

Attack

Distribute-Denial-of-Service

A Distribute-Denial-of-Service (DDoS) sends huge streams of traffic to systems, servers or networks, to exhaust their resources and bandwidth. As a result, the system under attack will no longer be able to fulfill its legitimate demands.

Post blog virus - SWLinjection - LF Impianti
Post blog virus - Zeroday - LF Impianti

SOS vulnerability:

SQL injection & Zero-day attacks

A SQL (Structured Query Language ) injection occurs when a hacker inserts a malicious code on a server that uses SQL and force it to make public information that should normally remain confidential. To perform SQL injection, it is sufficient to add malicious code to the input box of a vulnerable website.

A zero-day attack , on the other hand, strikes as soon as a vulnerability is discovered in the network, but before a patch or fix can be implemented.

How to build a solid cybersecurity system?

Would you like further information on some specific topic?

Leave us a comment and we will satisfy your request, for a tech world within everyone’s reach!

Leave a Reply

Your email address will not be published. Required fields are marked *